Connected Emergency Services Module
Provides instant encrypted video to connect emergency services with hospital based specialists and virtual care hubs. Through body worn cameras, mobile devices or tablets it allows the remote specialist to see and hear what the Responders see and hear to facilitate rapid and accurate diagnosis and decision making.
Features
- Native video resolution data image quality
- Clinically risk assessed, with full reporting capabilities
- Ability to work over low bandwidth
- Patented multi stream technology.
- Easily Scalable
- Multiple Camera inputs for 360 degrees views.
- Connected external devices such as diagnostic imaging
- Presence, chat, record, desktop and app share
- Moderator controls
- Works on Windows, Mac, IOS, Android and Linux
Benefits
- Immediate one click access to expertise
- Critical decision making via instant video consultations
- A mobile first app for pre-hospital assessment
- Works over standard internet protocols reduces need for specialist support
- Re-use existing hardware and does not require expensive infrastructure
- Reduce unnecessary conveyencing, getting patients the right care
- Share resources with virtual services across an entire region
- Supports multi-agency collaboration and situational analysis
- Can be embedded into existing platform
- Unrestricted collaboration capability depending on licence type
Pricing
£49 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
8 6 2 0 9 9 8 1 7 0 8 0 0 0 2
Contact
VISIONABLE UK LTD
Alan Lowe
Telephone: 07931249343
Email: sales@visionable.com
Service scope
- Software add-on or extension
- No
- Cloud deployment model
- Private cloud
- Service constraints
- None
- System requirements
-
- Requires Windows 7+, Mac ISOS or Linux
- Internet Connection
- For images one or more built in camera or PTZ
- Audio device
- One of: Android, laptop, tablet, iPhone
- WIFI/3G/4G/5G
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We have different levels of service and business hours based on support package taken. Support hours: Bronze : Monday to Friday 09:00 to 17:00 Silver: Monday to Friday 08:00 to 18:00 Gold: 7 days 08:00 to 18:00 Platinum: 24/7/365 Response times vary between 30min and 14 hrs based on the ticket priority and support package associated to.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 9 to 5 (UK time), 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Users have the ability to access Live Support Chat with a Support Agent from our Support Portal.
- Web chat accessibility testing
- N/A
- Onsite support
- No
- Support levels
- We have 4 support levels Platinum, Gold, Silver and Bronze all include performance monitoring. Bronze only provides online support (email and portal ticket mgmt) M-F 09:00-17:00. Silver provides live chat on top of Bronze extending M-F 08:00 to 18:00. Gold adds telephone support extending to 7 days 08:00-18:00, and Platinum extends further to 24/7/365 with additionally providing an account manager where issues can be escalated to. Full details are provided in the pricing document and service definition document depending on level of support required and are based on storage and licence cost. Support for the licence ranges 0% for Bronze and up to 15% for platinum plus 10% of the hosting. In addition we have self help videos and support materials which are available to customers.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- A link is provided on startup with details about training for both the administrator and users and other onboarding information. Single users can access our support on line portal for getting started including documents, videos and in depth training materials. Organisations can purchase training to meet their needs. the documentation allows tools to overlay so that non text context is presented to the user in a text alternative.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- All users records are indexed by email address and can be deleted by purging files and database entries. We comply with all GDPR mandates and requirements as per current legislation.
- End-of-contract process
- If the customer decides they do not wish to re their subscription, the software will cease to work and they will be provided with instructions to remove the software from the designated device/pc. All user data will be purged by email address.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- Yes
- Compatible operating systems
-
- Android
- IOS
- Linux or Unix
- MacOS
- Windows
- Windows Phone
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- UI designed for mobile devices for easy use whilst on the move. Mobile users have various options including but not limited to: 1. show up to 3 large feeds 2. focus on one video and see all the other streams in a ribbon 3. focus on 2 feeds and show all others in a ribbon
- Service interface
- No
- User support accessibility
- None or don’t know
- API
- Yes
- What users can and can't do using the API
- The Visionable platform embraces an API-first principle, granting technology partners unlimited access to the same robust APIs utilized by our internal teams. This empowers partners to seamlessly provision and onboard users, simplifying setup for effortless adoption. With extensive administrative capabilities, partners have full control over user management, permissions, and access levels, ensuring a customized experience for each client. Administrators can efficiently oversee resources, monitor usage metrics, and configure settings to suit specific requirements. Through a comprehensive array of API endpoints, partners can programmatically manage workflows, automate tasks, and orchestrate intricate operations, enhancing efficiency and productivity. Furthermore, partners can expand the platform's functionality by integrating additional features and services, enriching the user experience, and fostering innovation. Whether integrating with third-party tools, implementing custom workflows, or enhancing data analytics capabilities, our API-first approach empowers partners to deliver tailored solutions that perfectly align with the unique needs of their clients.
- API documentation
- Yes
- API documentation formats
- Open API (also known as Swagger)
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
- The application is completely customisable on many levels. Basic settings can be changed by the user and others can be changed by a customer super user. Some of the basic customisation includes uploading logos and colours on the server. Some advanced white label options may be subject to an additional charge.
Scaling
- Independence of resources
- Multiple Visionable Servers are deployed as a cloud of nodes that can be monitored and scaled for demand. Any additional demand is addressed by increasing capacity. We scale server (nodes) and bandwidth as demand increases with no impact to users.
Analytics
- Service usage metrics
- Yes
- Metrics types
- Account managers can generate usage reports to provide this information to customers upon request.
- Reporting types
-
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Security Clearance (SC)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
- United Kingdom
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least every 6 months
- Penetration testing approach
- In-house
- Protecting data at rest
- Physical access control, complying with CSA CCM v3.0
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Data importing and exporting
- Data export approach
- Account managers and customer administrators can generate usage reports by email address.
- Data export formats
- CSV
- Data import formats
- CSV
Data-in-transit protection
- Data protection between buyer and supplier networks
- TLS (version 1.2 or above)
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
- A minimum of 99.9% availability for our lowest Support package offering. Service credits are only provided on the hosting element and are passed directly from the hosting provider to you as a customer. The service credits start from the time and date that it was escalated to the hosting provider.
- Approach to resilience
- High availability fault tolerant database with federated servers distributed across multiple data centres.
- Outage reporting
- The service is monitored with network monitoring software and email alerts generated for both proactive and reactive issues to our Support team. The Support team will contact customers to advise of any issues identified that may be service impacting. Tickets are raised to track updates through to resolution. We discuss the impact and resolution of any preventative action already taken by the infrastructure team. Any Major Incidents or outages will have full Incident management and Major Incident Management documentation completed as required inline with customer support contract agreement.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- We adhere to a standard methodology and hierarchical structure ranging from Support User with limited access only dealing with what is available to them to administrators who are senior engineers. Access is only granted if necessary, and least permissions given whilst still allowing required tasks/access to be completed.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- At least 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- Between 1 month and 6 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- NQA
- ISO/IEC 27001 accreditation date
- 28/06/2023
- What the ISO/IEC 27001 doesn’t cover
- Nothing
- ISO 28000:2007 certification
- No
- CSA STAR certification
- Yes
- CSA STAR accreditation date
- 8/11/2020 Via Hosting provider
- CSA STAR certification level
- Level 2: CSA STAR Attestation
- What the CSA STAR doesn’t cover
- This is provided by the hosting provider and the Software is excluded
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- No
- Other security certifications
- Yes
- Any other security certifications
-
- ISO 27701
- ISO 9001
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- ISO/IEC 27001
- Information security policies and processes
- We are accredited and update all of our policies at least once or year or where the threat level changes. We have a number of committees that report into the Senior Leadership Team (Board) that support and control the implementation of the service management systems and security policies. These include: 1. Annual Board meeting where risks are presented for review. 2. Risk Committee chaired by the Chief Of Staff: Meets every 6 months with senior management and operations to review risks of the business and ongoing security controls. 3. Operations meeting: Meetings held bi-weekly to consider priorities for the week across the business including compliance with KPIS and ISMS. 4. Compliance meetings: Held every 2-3 months with Chief of Staff, Head of People and Compliance consultant to review ISMS.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Typically many customers have their own change boards and processes. Visionable change is submitted via a change request form that is sent to the Change Board for approval. This includes the type of change, purpose of the change, impact on the business and timeframe. The Change Board will approve the change request and allocate/agree the time for the change. This includes an impact assessment and a clinical review. All changes to the system go through a pen test, testing and quality assurance to ensure that there is no impact on customer security. Asset tracking tools are updated post change.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- We conduct regular pen testing, internal testing, and general security audits. OS patches are automatically applied nightly and vulnerability reporting is conducted. We run regularly scripts to identify any issues with the system. In addition we have monthly agreed maintenance windows for non security patches and customers are provided details of these.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- Each server/service has a status page that monitors its health and can be monitored with monitoring software to generate proactive and reactive alerts. We react quickly to resolve the issue as our support team will work on the issue as soon as it is identified. We aim to identify issues before they become service impacting and resolve to ensure uninterrupted service to customers.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- We have predefined processes for events and these are regularly reviewed and updated. Support and software problems can be reported via telephone, email, via portal access, or live chat. Incident reports are provided by email where required, but customers also have the ability to view updates on their ticket as they are worked on by Support through the Support Portal.
Secure development
- Approach to secure software development best practice
- Independent review of processes (for example CESG CPA Build Standard, ISO/IEC 27034, ISO/IEC 27001 or CSA CCM v3.0)
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
Tackling economic inequalityTackling economic inequality
The Visionable platform enables health and care teams to connect with patients from anywhere to anywhere, supporting a model that allows limited specialist resources to be distributed across a much wider population cohort. Specialist stroke consultants can provide out of hours remote support to hospitals that don't have an on site stroke team, urgent care teams can call on maternity and mental health specialists to provide triage support even in the most rural areas and patients can be cared for closer to home. Utilising a digital care model enables all patients to have access to the same care regardless of location or economic status.
Pricing
- Price
- £49 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- Limited to 1 month